In designing multi-core processors, interconnection delay is one of the major constraints in performance improvement. To solve this problem, the 3-dimensional integration technology has been adopted in designing multi-core processors. The 3D multi-core architecture can reduce the physical wire length by stacking cores vertically, leading to reduced interconnection delay and reduced power consumption. However, the power density of 3D multi-core architecture is increased significantly compared to the traditional 2D multi-core architecture, resulting in the increased temperature of the processor. In this paper, the floorplan methods which change the forms of vertical placement of the core and the level-2 cache are analyzed to solve the thermal problems in 3D multi-core processors. According to the experimental results, it is an effective way to reduce the temperature in the processor that the core and the level-2 cache are stacked adjacently. Compared to the floorplan where cores are stacked adjacently to each other, the floorplan where the core is stacked adjacently to the level-2 cache can reduce the temperature by 22% in the case of 4-layers, and by 13% in the case of 2-layers.

In this paper, we propose an optimal scheduling scheme that minimizes the energy consumption of a real-time video task on the multi-core platform supporting dynamic voltage and frequency scaling. Exploiting parallel execution on multiple cores for less energy consumption, the propose scheme allocates an appropriate number of cores to the task execution, turns off the power of unused cores, and assigns the lowest clock frequency meeting the deadline. Our experiments show that the proposed scheme saves a significant amount of energy, up to 67% and 89% of energy consumed by two previous methods that execute the task on a single core and on all cores respectively.

In the global IT market, a lot of issues for responding to various environmental regulations emerged. In case of the data centers, it is consuming huge amounts of energy to maintain. So there have been various technical attempts as Consolidation, Virtualization, Optimization to efficiently manage energy and data storage to fix the problems. In this paper, we propose a new RAID(Redundant Array of Independent Disks) mechanism which is differing the intensity of power consumption and works to provide data protection and disaster recovery(backup, mirroring etc.) to stratify multiple volumes. G-RAID minimize the power consumption and the lower of I/O performance by selecting the volume depending on the frequency of data access while classifying the power consumption between volumes in storage system. Also, it is possible that a filesystem and block map information of G-RAID is processed by basic unit which is group located in a row for the blocks to work efficiently and can minimize the performance degradation of block mapping load by the access frequency in each groups. As a result, we obtained to elevate a little bit of response time caused by block relocation work, but showed the decrease of power consumption by 38%.

In order to maintain clean environment in an interior space and an enclosed cattle pen, we have to measure and control environmental factors which are temperature, humidity and CO2, CH4 and so on. Although the measured values are within the normal range, those are increased or decreased sharply by the feces or environmental impacts. In order to take early an appropriate action, we propose an early warning method(EWarM) in this paper, which can recognize the rapidly changing time for the increasing or decreasing rate of the measured values. In addition, we developed fuzzy control system based on an EWarM. We verified that this system based on an EWarM is used for eliminating that impacts through performance evaluation in a variety of environmental situations.

Code obfuscation has been proposed to protect codes in a program from malicious software reverse engineering. It converts a program into an equivalent one that is more difficult to understand the program. Code obfuscation has been classified into various obfuscation technique such as layout, data, control, by obfuscating goals. In those obfuscation techniques, control obfuscation is intended to complicate the control flow in a program to protect abstract information of control flow. For protecting control flow in a program, various control obfuscation transformation techniques have been proposed. However, strategies for effectively applying a control flow obfuscation to program have not been proposed yet. In this paper, we proposed a obfuscation strategy that effectively applies a control flow obfuscation transformation to a program. We conducted experiment to show that the proposed obfuscation strategy is useful for applying a control flow transformation to a program.

In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.

In this paper, it is realized an image filter for a noise elimination using a recurrent neural networks with fuzzy. The proposed fuzzy neural networks structure is to converge weights and the number of iteration for a certain value by using basically recurrent neural networks structure and is simplified computation and complexity of mathematics by applying the hybrid fuzzy membership function operator. In this paper, the proposed method, the recurrent neural networks applying fuzzy which is collected a certain value, has been proved improving average 0.38dB than the conventional method, the generalied recurrent neural networks, by using PSNR. Also, a result image of the proposed method was similar to the original image than a result image of the conventional method by comparing to visual images.

In this paper, we propose a learning based super resolution algorithm using local block for image enhancement of vehicle license plate. Local block is defined as the minimum measure of block size containing the associative information in the image. Proposed method essentially generates appropriate local block sets suitable for various imaging conditions. In particular, local block training set is first constructed as ordered pair between high resolution local block and low resolution local block. We then generate low resolution local block training set of various size and blur conditions for matching to all possible blur condition of vehicle license plates. Finally, we perform association and merging of information to reconstruct into enhanced form of image from training local block sets. Representative experiments demonstrate the effectiveness of the proposed algorithm.

In this paper, We propose real-time sound editing and playback systems which is based on Augmented Reality. The proposed system are composed with music maker which is based on AR maker and music board. By using music marker`s contents, the proposed system selects the kinds of musical instruments and pre-defined midi track and by calculating the relative location of music marker on 2-dimensional plane, we set the spatial relative parameter in midi track. For performance evaluation, we check the jitter value of in various resolutions by using CAM which supports as the maximum resolution. As a result, when we set the configuration value of CAM as pixels and process two frames per minute, the success ratio of recognizing music markers and jitter values are accegnable. It can be utilized in the fields of alternative cmacine which is based on music and also be utilized in the educational aspects because child or elderly who don`t know enough musical theory can easily handle it.

When examining current process of object tracking and search, objects were tracked by extracting them from image that was inputted through fixed single camera and objects were recognized through Zoom function to know detailed information on objects tracked. This study proposed system that expresses information on area that can seek and recognize object tracked as augmented reality by recognizing and seeking object by using multi camera. The result of experiment on proposed system showed that the number of pixels that was included in calculation was remarkably reduced and recognition rate of object was enhanced and time that took to identify information was shortened. Compared with existing methods, this system has advantage of better accuracy that can detect the motion of object and advantage of shortening time that took to detect motion.

Ubiquitous computing technology makes an impact on the appearance of u-learning and presents an advanced direction of futuristic school education. In ubiquitous learning environments, various embedded computational devices will be pervasive and interoperable across the network for supporting the learning, so users may utilize these devices anytime anywhere. An important next step for ubiquitous learning is the introduction of context-aware learning service that employing knowledge and reasoning to understand the local context and share this information in support of intelligent learning services. However, the existing studies on design and application of ontology context model to support context-aware service in actual school environments are incomplete state. This paper, therefore, suggests a scheme of constructing ubiquitous learning space for existing school network by introducing USN to support context-aware ubiquitous learning services. This paper, also, designs an ontology based context model for ubiquitous school environments which describes context information through OWL. To determine the suitability of proposed ubiquitous learning space and ontology context model, we implement some of context-aware learning services in the ubiquitous learning environments.

This paper proposed a smart phone tour game using A-GPS. This game is a fused content of tourism and education. This game is based on the historical background of Silla and spatial background of GyoengJu. Game event has occurred by comparing pre-measured GPS values and smart phone A-GPS values. The field test of event were used to correct the A-GPS error by 3 times. This paper has looked at game planning and run screen. In addition, the future direction of the game were discussed.

On the point of data quality management, data quality is influenced by quality policy, quality organization, business process, and business rule. Business rules, guide of data manipulation, have effects on data quality directly. In case of building an integration database among distributed databases, defining business rule is more important because data integration needs to consider heterogeneous structure, code, and data standardization. Also data value has various figures depended on data type, unit, and transcription. Finally, database structure and data value problem have to be solved to improve data quality. For handling them, it is needed to draw database integration model and cleanse data in integrated database. NTIS(stands for National science and Technology Information Service) has an aim to serve users who need all information about national R&D by internet, and for that aim, it has a integrated database which has been made with several database sources. We prove that database integration model and data cleansing are needed to build a successful integrated database through NTIS case study.

In this paper, we propose a new multipath routing protocol and compare it with other multipath routing protocols in mobile ad hoc network (MANET) environments. The new multipath routing establishes the main route using a mechanism based on Ad Hoc On-demand Distance Vector(AODV), after which data transmission starts immediately. The backup route search process takes place while data are transmitted, to reduce the transmission delay. The protocol can also operate in a hybrid node-disjoint/link-disjoint mode, where the protocol finds the node-disjoint backup route first; if the node-disjoint does not exist, the protocol discovers the link-disjoint backup route from the main route. When either of the main route or the backup route is broken, data are transmitted continuously through the other route and the broken route is recovered by the route maintenance process. The results of simulations, based on the Qualnet simulator, show that the proposed multipath routing protocol increases the packet transmission success rate and reduces end-to-end delays, when compared with AODV and AOMDV protocols.

The goal of Ubiquitous Sensor Network(USN) environments is to provide users high quality services based on a variety of sensors. In this environment, sensor devices, sensor nodes and sensor networks are heterogeneous and have various characteristics. Therefore it is important for interoperability to define a metadata for describing USN resources. The OGC(Open Geospatial Consortium) proposes SensorML(Sensor Model Language) as a standard language for modeling sensors. However, SensorML provides a framework for describing a processing model among sensors rather than describing information of sensors. Therefore, to describe a USN metadata is not main purposes of SensorML. This paper defines a USN metadata which describes information about sensor device, sensor node, and sensor network. Also the paper proposes a method for efficiently storing and searching the USN metadata and implements a USN metadata management system based on our method. We show that our metadata management system is reasonable for managing the USN metadata through performance evaluation. Our USN metadata keeps the interoperability in USN environments because the metadata is designed on SensorML. The USN metadata management system can be used directly for a USN middleware or USN application.

APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user`s facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user` access is controlled by distinction algorism of similarity utilizing DC values of image`s pixel and luminance.

A gigantic ship is constructed by assembling various types of ship blocks, each block being made by cutting and piecing the steel-plates together. The steel-plate piling process as the initial stage of ship construction sorts and manages the steel-plates according to the ship blocks that the steel-plates are used to make. The steel-plate piling process poses some problems such as process delay due to piling errors, safety vulnerability due to the handling of extra heavy-weight objects, and the uncertainty of work plan due to lack of information management in the pile spaces. We constructed a steel-plate piling process system based on the context-aware computing to resolve such problems. We built simulation system that can simulate the piling process and then established a smart space within the system by using tags, sensors and a real-time location system in order to collect context information. Workers receive an appropriate or intelligent service from the system.

This paper suggests the minimum number of vertex guards algorithm. Given n rooms, the exact number of minimum vertex guards is proposed. However, only approximation algorithms are presented about the maximum number of vertex guards for polygon and orthogonal polygon without or with holes. Fisk suggests the maximum number of vertex guards for polygon with n vertices as follows. Firstly, you can triangulate with n-2 triangles. Secondly, 3-chromatic vertex coloring of every triangulation of a polygon. Thirdly, place guards at the vertices which have the minority color. This paper presents the minimum number of vertex guards using dominating set. Firstly, you can obtain the visibility graph which is connected all edges if two vertices can be visible each other. Secondly, you can obtain dominating set from visibility graph or visibility matrix. This algorithm applies various art galley problems. As a results, the proposed algorithm is simple and can be obtain the minimum number of vertex guards.

The purpose of this study was to analyze the effects of internal marketing on job satisfaction and organizational commitment of secretaries working in IT based companies. Especially, to analyze the effects of internal marketing on secretaries in IT companies, this study has adopted job specialization rather than the comprehensive market point of internal customers. Through the analysis, the following results were obtained: firstly, internal marketing factors such as effectiveness of communication, various compensation systems, and chance of educational training have positive effects on job satisfaction and organizational commitment. Secondly, job satisfaction has no impact on organizational commitment. To be able to satisfy external customers through internal marketing, communication skills has be to improved between the workers in the company, and also various compensation systems and educational training should be provided more extensively. The secretary in the company is considered a vital link between the company and customer service. In this view, the result of this study is expected to provide some managerial strategies to decision maker in the company to establish a way to increase the satisfaction and needs of internal customers in applying internal marketing.